Systems Applications Proxy Pwnage

Systems Applications Proxy Pwnage

44CON Information Security Conference via YouTube Direct link

Welcome

2 of 32

2 of 32

Welcome

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Systems Applications Proxy Pwnage

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Welcome
  3. 3 Agenda
  4. 4 Why
  5. 5 Disclaimers
  6. 6 History
  7. 7 SAP Conquest Data
  8. 8 Fundamentals
  9. 9 Compression Algorithm
  10. 10 Compression Protocol
  11. 11 Decompression Length
  12. 12 Wireshark
  13. 13 Group Connections
  14. 14 Recompression
  15. 15 Application Protocol
  16. 16 Message Types
  17. 17 Transaction ID
  18. 18 Other Information
  19. 19 Input Fields
  20. 20 Complex Messages
  21. 21 bars
  22. 22 FF structures
  23. 23 How it works
  24. 24 Attack API
  25. 25 Authentication Bypass
  26. 26 Validation
  27. 27 Replay
  28. 28 Demo
  29. 29 SAP GUI
  30. 30 Boss
  31. 31 Summary
  32. 32 Sunset

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.